General
-
Target
9150a13870201639aa50f7aeeff0f64bedc72e6e37a878465135221f8c282676_NeikiAnalytics.exe
-
Size
6.3MB
-
Sample
240628-llsrjsvgpk
-
MD5
242d3543e74bb90d18f720ca102467b0
-
SHA1
14d731832a01f57a01eb824773b2431fe1703ded
-
SHA256
9150a13870201639aa50f7aeeff0f64bedc72e6e37a878465135221f8c282676
-
SHA512
e048e1e63356546268407c22f39661f08eb2a839845783ca248703d56b0b3d9ab39a5538e1c68ad4d8258cf13ce16fa7fbe423d15e18addc19cd8c97785dc069
-
SSDEEP
98304:zf+RWwamZZcJCZo/g+iE30txIOhDKszmwdM:zGRWHCZo/gsEHIPSe
Behavioral task
behavioral1
Sample
9150a13870201639aa50f7aeeff0f64bedc72e6e37a878465135221f8c282676_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9150a13870201639aa50f7aeeff0f64bedc72e6e37a878465135221f8c282676_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
discordrat
-
discord_token
MTIyMTE4NjI0NzgwOTE3MTUyNw.GSCOTR.Eh-rIiDlHbTdHlbNBtQBvL4mNr_1CZSJAFMdUU
-
server_id
1221187390354227391
Targets
-
-
Target
9150a13870201639aa50f7aeeff0f64bedc72e6e37a878465135221f8c282676_NeikiAnalytics.exe
-
Size
6.3MB
-
MD5
242d3543e74bb90d18f720ca102467b0
-
SHA1
14d731832a01f57a01eb824773b2431fe1703ded
-
SHA256
9150a13870201639aa50f7aeeff0f64bedc72e6e37a878465135221f8c282676
-
SHA512
e048e1e63356546268407c22f39661f08eb2a839845783ca248703d56b0b3d9ab39a5538e1c68ad4d8258cf13ce16fa7fbe423d15e18addc19cd8c97785dc069
-
SSDEEP
98304:zf+RWwamZZcJCZo/g+iE30txIOhDKszmwdM:zGRWHCZo/gsEHIPSe
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-